Paper
29 January 1997 Ver-i-Fus: an integrated access control and information monitoring and management system
Stelios C.A. Thomopoulos, James G. Reisman, Yiannis E. Papelis
Author Affiliations +
Proceedings Volume 2934, Security Systems and Nonlethal Technologies for Law Enforcement; (1997) https://doi.org/10.1117/12.265414
Event: Enabling Technologies for Law Enforcement and Security, 1996, Boston, MA, United States
Abstract
This paper describes the Ver-i-Fus Integrated Access Control and Information Monitoring and Management (IAC-I2M) system that INTELNET Inc. has developed. The Ver-i-Fus IAC-I2M system has been designed to meet the most stringent security and information monitoring requirements while allowing two- way communication between the user and the system. The systems offers a flexible interface that permits to integrate practically any sensing device, or combination of sensing devices, including a live-scan fingerprint reader, thus providing biometrics verification for enhanced security. Different configurations of the system provide solutions to different sets of access control problems. The re-configurable hardware interface, tied together with biometrics verification and a flexible interface that allows to integrate Ver-i-Fus with an MIS, provide an integrated solution to security, time and attendance, labor monitoring, production monitoring, and payroll applications.
© (1997) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Stelios C.A. Thomopoulos, James G. Reisman, and Yiannis E. Papelis "Ver-i-Fus: an integrated access control and information monitoring and management system", Proc. SPIE 2934, Security Systems and Nonlethal Technologies for Law Enforcement, (29 January 1997); https://doi.org/10.1117/12.265414
Lens.org Logo
CITATIONS
Cited by 2 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Databases

Control systems

Telecommunications

Biometrics

Human-machine interfaces

Computer security

Back to Top